Law.com Subscribers SAVE 30%

Call 855-808-4530 or email [email protected] to receive your discount on a new subscription.

Home Topics

Technology Media and Telecom

Columns & Departments

Movers & Shakers Image

Movers & Shakers

A Collection of Moves in the Cybersecurity and Privacy Practice Areas

Features

<b><i>Breaking News:</b></i> Microsoft Prevails on Appeal in Dodging Warrant for Foreign E-mails Image

<b><i>Breaking News:</b></i> Microsoft Prevails on Appeal in Dodging Warrant for Foreign E-mails

Mark Hamblett

Microsoft and other U.S.-based internet service providers won a major victory on July 14 at the U.S. Court of Appeals for the Second Circuit, which reversed a lower court in finding the company is not required to comply with a U.S. warrant for customer e-mails stored on a server in Dublin.

Features

Valuable Information Security Lessons from <i>Olympus Mortgage vs. Guaranteed Rate</i> Image

Valuable Information Security Lessons from <i>Olympus Mortgage vs. Guaranteed Rate</i>

Craig Nazzaro & Tracy E. Weir

Earlier this year, a jury awarded Mount Olympus Mortgage Company (MOMC) more than $25 million for its claims against Guaranteed Rate, which alleged Guaranteed ' along with other former employees of MOMC ' illegally transferred hundreds of loan files from MOMC's internal systems to Guaranteed. The award is notable for showcasing how important it is for a company to maintain control of its data security, both from external threats and employees.

Features

European Data Protection Supervisor Suggests Path After Parliament Dismisses Privacy Shield Draft Image

European Data Protection Supervisor Suggests Path After Parliament Dismisses Privacy Shield Draft

Ricci Dipshan

On May 26, coming less than two months after the Article 29 Working Party rebuke of the Privacy Shield, the EU parliament voted 501 to 119 on a resolution calling for negotiations on the agreement to continue. Its criticisms of the text echoed that of the Working Party, namely the Privacy Shield's insufficiency in dealing with U.S. mass surveillance, protecting EU individual data rights and protections, and effectively enforcing its regulations.

Features

DC Circuit Upholds FCC Net Neutrality Rules Image

DC Circuit Upholds FCC Net Neutrality Rules

Zoe Tillman & C. Ryan Barber

A federal appeals court in Washington on June 14 upheld expansive federal regulations that require broadband internet providers to treat Internet traffic equally regardless of its source.

Columns & Departments

<b><i>e-Discovery and Security</b></i> The Inevitable Reinvention of the e-Discovery Industry Image

<b><i>e-Discovery and Security</b></i> The Inevitable Reinvention of the e-Discovery Industry

Jared Coseglia

The e-discovery industry is on the precipice of major change yet again, and this time it is all about security. What will distinguish the winners from the losers in the next few years will be an organization's ability to do one of three things: consolidate, innovate or reinvent.

Features

Preparing for New Crowdfunding Regulations Image

Preparing for New Crowdfunding Regulations

Katayun I. Jaffari & Kimberly W. Klayman

On May 16, Regulation Crowdfunding came into effect. Regulation Crowdfunding is applicable to crowdfunding offerings conducted in reliance on Section 4(a)(6) of the Securities Act of 1933, as amended.This article summarizes the practical terms of the crowdfunding rules.

Features

FCC's Proposed Rulemaking For Broadband Internet Access Providers Image

FCC's Proposed Rulemaking For Broadband Internet Access Providers

Alan Friel & Suchi Pahi

In 2015, the FCC issued its Open Internet Order, applying Section 222 of the federal Communications Act to broadband Internet access services (BIAS), and in doing so took jurisdiction over privacy and data security matters for Internet Service Providers (ISPs). Having taken on BIAS, the Commission needed to address the FCC's privacy and data protection regulatory scheme.

Features

Recent Uses of Software and the DMCA Image

Recent Uses of Software and the DMCA

Richard Raysman & Peter Brown

One of the motivations for enacting the Digital Millennium Copyright Act (DMCA) was the acknowledgement by Congress of "the ease with which pirates could copy and distribute a copyrightable work in digital form was overwhelming the capacity of conventional copyright enforcement to find and enjoin unlawfully copied material." Among the provisions created to redress this rampant infringement were the prohibitions against: 1) removing copyright management information (CMI); and 2) circumventing technological measures in place to prevent infringement. Each is controversial.

Features

Measure to Manage: Understanding and Using Data to Affect Firm Change and Client Relationships Image

Measure to Manage: Understanding and Using Data to Affect Firm Change and Client Relationships

Justin Hectus & Peter Zver

Organized and meaningful data has been leveraged in progressive organizations for years, but now that data and information is highly accessible and easily consumable via the ever-expanding digital mesh, enterprise-level expectations and related legal business impact have been elevated. With this new reality come many questions.

Need Help?

  1. Prefer an IP authenticated environment? Request a transition or call 800-756-8993.
  2. Need other assistance? email Customer Service or call 1-877-256-2472.

MOST POPULAR STORIES

  • Major Differences In UK, U.S. Copyright Laws
    This article highlights how copyright law in the United Kingdom differs from U.S. copyright law, and points out differences that may be crucial to entertainment and media businesses familiar with U.S law that are interested in operating in the United Kingdom or under UK law. The article also briefly addresses contrasts in UK and U.S. trademark law.
    Read More ›
  • Strategy vs. Tactics: Two Sides of a Difficult Coin
    With each successive large-scale cyber attack, it is slowly becoming clear that ransomware attacks are targeting the critical infrastructure of the most powerful country on the planet. Understanding the strategy, and tactics of our opponents, as well as the strategy and the tactics we implement as a response are vital to victory.
    Read More ›
  • The Article 8 Opt In
    The Article 8 opt-in election adds an additional layer of complexity to the already labyrinthine rules governing perfection of security interests under the UCC. A lender that is unaware of the nuances created by the opt in (may find its security interest vulnerable to being primed by another party that has taken steps to perfect in a superior manner under the circumstances.
    Read More ›